This article is contributed. See the original author and article here.

Apply Zero Trust principles and policies to your network and infrastructure with this essentials episode. It’s a high-level overview of the principles of the Zero Trust security model, spanning identity, endpoints, applications, networks, infrastructure, and data.


 


Screen Shot 2021-07-07 at 12.14.09 PM.png


 


Your network and its underlying configuration provides secure access to your resources. Infrastructure, whether on premises servers, local or cloud hosted VMs, containers, storage, or PaaS databases, all represent a critical threat vector. Jeremy Chapman, Director of Microsoft 365, walks you through how to apply the core Zero Trust tenets of verify explicitly, apply least privileged access, and assume breach for each of these layers, along with your options.


 



 





QUICK LINKS:








Link References:






Unfamiliar with Microsoft Mechanics?




 


Keep getting this insider knowledge, join us on social:










Video Transcript:



























Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.